Hi user
Admin Login:
Name: mitmproxy - use and abuse of a hackable SSL-capable man-in-the-middle proxy
--client la --show lca_2012 --room Caro 55 --force
Next: 1 Women in open technology and culture worldwide
Marks
Author(s):Jim Cheetham
LocationCaro
Date jan Thu 19 Days Raw Files
Start11:30 First Raw Starterror-in-template
Duration0:50:00 OffsetNone
End 12:20 Last Raw End
Chapters
Total cuts_timeNone min.
http://lca2012.linux.org.au/schedule/73/view_talk
raw-playlist raw-mp4-playlist encoded-files-playlist mp4 svg png
final audio

assets release.pdf mitmproxy_use_and_abuse_of_a_hackable_SSLcapable_maninthemiddle_proxy.json
logs
Admin: episode episode list cut list raw files day marks day marks day image_files

clear this to unlock

user/process that locked.

initially scheduled time from master, adjusted to match reality

length in hh:mm:ss

Video Title (shows in video search results)

email(s) of the presenter(s)

has someone authorised pubication

m=mono, 01=copy left to right, 10=right to left, 00=ignore.

filename.png

markdown

production notes

root is .../show/dv/location/, example: 2013-03-13/13:13:30.dv

check and save to add this


Veyepar Video Eyeball Processor and Review